VerifyVaultverifyvault.hashnode.dev·Jul 16, 2024Decrypting the Future: The Evolution of Ransomware and How to Safeguard Against ItIn recent years, the digital landscape has been marred by a sinister evolution: the rise of ransomware. Once merely a nuisance, ransomware has transformed into a sophisticated and pervasive threat, targeting everyone from multinational corporations t...Discuss2FA
Raeraeversing.hashnode.dev·Jul 12, 2024Malware Analysis Ransomware Script — BTLO Writeup.Olá pessoal! Hoje trago mais um write-up de uma CTF Free do Blue Team Labs Online. Dessa vez completei o laboratório Malware Analysis Ransomware Script, um laboratório de nível Fácil, onde analisaremos o Script de um Ransomware. Vamos lá! 1 — What is...Discussmalware analysis
Dhruv RajpurohitforCyber Securitycybersecurity2712.hashnode.dev·Dec 3, 2023Demystifying Ransomware: Understanding, Detecting, and Preventing the ThreatIntroduction In the ever-evolving landscape of cybersecurity, ransomware has emerged as one of the most formidable threats. This malicious software encrypts a user's files or system, rendering them inaccessible until a ransom is paid. Understanding h...Discusscybersecurity
Bishwajeet Biswasblog.ethernyte.com·Dec 1, 2023Unraveling the Intricacies of C# DLL Injection Malware: A Deep Dive into Malicious CodeIn the world of cybersecurity, every day is a battle against an evolving army of digital adversaries. Today, we're going to explore the thrilling, mysterious realm of C# DLL Malware. This journey will involve analyzing file hashes, decoding the secre...Discuss·129 reads#cybersecurity
Bishwajeet Biswasblog.ethernyte.com·Nov 24, 2023Excel Macros Unleashed: The Hidden Malware ThreatIn the realm of cybersecurity, the unassuming Excel spreadsheet has become a battleground for cybercriminals. Excel macro malware, the silent saboteurs, lurk within seemingly harmless files, waiting to strike. Let's embark on a quest to decode their ...Discuss·109 reads#cybersecurity
Bishwajeet Biswasblog.ethernyte.com·Nov 3, 2023A Journey through the Shadows: Unmasking Process Injector Malware"In a digital world teeming with threats, process injector malware is the silent infiltrator that lurks in the background, evading detection. Our mission: decode this digital enigma. Our tools: file hashes, VirusTotal (VT) analysis, and a healthy dose...Discuss#cybersecurity
Ethan Mitchellcybershield.hashnode.dev·Oct 9, 2023Deep Dive: The Evolution of Ransomware and How To Protect YourselfRansomware, a malicious software that encrypts your files and demands a ransom for their release, has become a pervasive and evolving threat in the digital landscape. Over the years, it has transformed and adapted, leaving individuals and organizatio...Discussransomware
The Intel Chroniclesintelchronicles.com·Sep 21, 2023Threat Actor "Seize" Offering Ergon Ransomware-as-a-Service on BreachForums 2Executive Summary On September 22, 2023, an underground forum member using the pseudonym "seize" unveiled Ergon, a cutting-edge Ransomware-as-a-Service (Raas) on BreachForums 2. Ergon, as described by seize, boasts full undetectability (FUD), effortl...DiscussThreat Intelligenceransomware
Derek Onwudiwetecheffect.hashnode.dev·Sep 7, 2023Traffic Light HackingWe frequently see movie scenarios when hackers are able to breach systems for the management of traffic lights, with devastating repercussions. This is a tested security research. Introduction Traffic lights are a critical component of urban infrastr...Discusstraffic
Nguyễn Đăng HưngforBlueCyber's blogbluecyber.hashnode.dev·Jun 17, 2023In-Depth Analysis Of An Old Famous Ransomware - Wannacry - PART.1I - Prologue It has been nearly 6 years since the infamous ransomware crisis known as 'Wannacry' affected most countries around the world. However, to this day, this malware is still frequently mentioned in discussions within the field of information...Discuss·10 likes·117 readsMalware